Skip to main content

Security Essentials for IT Professionals Articles

back
Show titles with any search term.
  • Data Hygiene

    • Media destruction, either physical or electronic, is intended to prevent data disclosure. Some ways data may be disclosed are: Computers that are disposed of or sold without...
    • Implementing a data cleanup process is more involved than just choosing the proper scan tool. Use the information in this section to help you prepare for data cleanup. Sources of...
    • Data discovery and cleanup is much more than simply deploying a data discovery tool and reacting to its search results. Other necessary components include: An understanding of local...
    • Options for erasing disks and wiping files.
    • This service is offered at no-fee to comply with best practices in a secure, affordable, and convenient way. No-Fee Cornell Service for Media Destruction: R5 R5 Operations (Respect...
    • Whenever possible, we recommend using Cornell's FREE R5 service to safely destroy media. See Dispose of computers and devices. Physical Destruction The objective of physical...
    • If you haven't already reported the incident, do so now. Work with technical support to contain the system (as outlined in our Protect Evidence article) while you gather and provide...
    • After running a data discovery tool such as Identity Finder, the next step in the data discovery and clean up process is to decide how to handle each positive hit. Following is an explanation of...